

Author: Kacem Hatem Hadj
Publisher: Inderscience Publishers
ISSN: 2042-3217
Source: International Journal of Information Technology, Communications and Convergence, Vol.2, Iss.3, 2012-11, pp. : 234-252
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










By Pallickara Shrideep Fox Geoffrey Gadgil Harshawardhan
International Journal of High Performance Computing and Networking, Vol. 5, Iss. 3, 2008-10 ,pp. :